Sciweavers

276 search results - page 28 / 56
» Generalized XML security views
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
SACMAT
2005
ACM
14 years 1 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
SWS
2004
ACM
14 years 29 days ago
Ticket-based fine-grained authorization service in the dynamic VO environment
Virtual Organization (VO) is a collection of users and distributed resources, in which resources are shared by users. Creating VOs is very important task in Grid computing. VOs ar...
Byung Joon Kim, Sung Je Hong, Jong Kim
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 1 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith